Search Results

You are looking at 1 - 10 of 19 items for :

  • methodology x
  • Information Management x
Clear All
Open access

Jin Zhang, Yanyan Wang, Yuehua Zhao and Xin Cai

1 Introduction The growth of different research fields is primarily driven by studies in these fields. As these research fields develop and the number of studies increase, the scope of these fields expands. Since the quality of research is determined in part by the research methodologies used, utilization of these methodologies, both quantitative and qualitative, has become more and more important. Research methodologies play an indispensable role in several research fields. As one of the main branches of quantitative methods, statistical methods are

Open access

Dar-Zen Chen and Chien-Hsiang Chou

characteristics. By using the methodology proposed in this study, critical insights into the major trends in a technological field can be revealed. Such information not only would be useful to the technology management and planning of companies but can also be of reference to policy makers in the creation and development of relevant policies. 2 Methodology To explore the trend of technology dominators and technology-related concerns, as well as their patent characteristics under different transition patterns, this study was conducted through the following steps

Open access

Eric Zheng, Yong Tan, Paulo Goes, Ramnath Chellappa, D.J. Wu, Michael Shaw, Olivia Sheng and Alok Gupta

1 Introduction Econometrics and machine learning used to perform well in their own orbits separately. They differ in purpose, focus, and methodologies. However, due to the abundant supply of “big data” and the demand for solving complex problems, there emerges a trend of applying econometrics and machine learning in an integral manner. At the 11th China Summer Workshop on Information Management (CSWIM 2017) in Nanjing, China, the meeting’s chairs assembled a panel of senior information system (IS) scholars to discuss the theme “When Econometrics Meets

Open access

Tolga Yuret

citation field and apply the necessary normalizations. The most important advantage of utilizing this methodology is its simplicity. A typical researcher may not possess the bibliometric expertise to understand more sophisticated methods for research evaluation. In contrast, it does not require much expertise to understand that publications that contain the word “cancer” in their titles have high citation performance. In this article, we investigated the viability of this method. We computed the performance of frequently used words in keywords, titles, and abstracts

Open access

Fred Y. Ye and Lutz Bornmann

increasing attention in scientometrics, and many different methods have been proposed for identifying excellent papers ( Bornmann, 2013 , 2014 ). The concept of “core documents” ( Glänzel, 2012 ) was introduced, mostly with a focus on “highly cited papers,” “most frequently cited papers,” or “top cited papers,” by the methodology of similarity. According to the review of Bornmann (2014 ), some different methods have been used in scientometric studies to identify excellent papers. However, most methods are applied in arbitrary ways by artificially setting proportions

Open access

Yi Shen

scientific data instrumentation and opportunities for repository system development and service improvement. By adopting the classic critical incident methodology ( Flanagan, 1954 ) and creative scenario-building approach, this study aims to answer the following questions: What are the most valuable data features , search properties, and integrative characteristics for scientific data discovery , use , and analysis? How do scientists perceive the characteristics and compare the functionalities of different types of data repository systems? 2 Methodology To

Open access

Minghong Chen, Jingye Qu, Yuan Xu and Jiangping Chen

purposes, targeted health problems or diseases, methodologies, devices and impacts. We first removed duplicate records, leaving 188 records for the analysis. Then we conducted the “word cutting” by using the word_tokenize method in python, and then the “WordNet Lemmatizer method” in the Natural Language Toolkit (NLTK) ( Bird ) . The word lemmatizer was used to reduce inflectional forms and derivationally related forms of a word to its common base form. Compared with the stemming process, the WordNet Lemmatizer does not simply chop off inflections, but instead relies on

Open access

Tingting Jiang, Jiaqi Yang, Cong Yu and Yunxin Sang

, which allows an analysis of their visiting behavior in a comparative manner. To be specific, the comparison was performed to address the following research questions: (1) Are desktop and mobile users different in terms of the type of pages they viewed? If yes, what are the differences? (2) Are desktop and mobile users different in terms of the pattern of interacting with products? If yes, what are the differences? (3) Are desktop and mobile users different in terms of the time they spent on pages? If yes, what are the differences? 3 Methodology 3

Open access

Ahmed AlKalbani, Hepu Deng, Booi Kam and Xiaojuan Zhang

compliance. The rest of this paper is organized as follows. Section 2 presents a literature review of information security compliance from the perspective of institutional pressures on organizations. Section 3 presents an information security compliance model with a focus on the impact of institutional pressures on information security compliance in organizations. Section 4 describes the research methodology that this study adopts. Section 5 presents the research findings based on the analysis of the survey data. Finally Section 6 presents the conclusion with

Open access

Liang Hong, Mengqi Luo, Ruixue Wang, Peixin Lu, Wei Lu and Long Lu

methods on a large and feature-rich data set to generate a consolidated set of factors and use them to develop Cox regression models for heart–lung graft survival. The main objective of this study was to improve the prediction of outcomes following combined heart–lung transplantation by proposing an integrated data-mining methodology. The data files were obtained from United Network for Organ Sharing (UNOS) using a formal data requisition procedure. The complete data set consists of 443 variables and 61,391 records. These variables included the socio-demographic and